Batch 16

Post Graduate Certificate in Cybersecurity

Learn market-ready cybersecurity skills in a high-growth market. Gain the MIT xPRO advantage.
  • Personalized feedback from program leaders, insights from guest speakers and mentorship from leading faculty
  • 250+ pre-recorded videos* for self-paced learning from top MIT faculty
  • Bi-weekly doubt clearing session with learning facilitators
  • Certification from MIT xPRO to recognize your skills and success
Country/Region
Work Experience

Please note that GST at 18% will be charged additionally to the program fee.

Round Application Deadline

Upcoming round deadline: December 23, 2024 at 11:59 PM | Application Fee: INR 2000 + GST

Program Overview

Cybersecurity as a career requires thinking quickly and strategically to ward off data breaches and network takeovers. It entails a strategic cat-and-mouse game of ever-changing defensive and offensive techniques. As a cybersecurity specialist on the frontline protecting enterprise IT networks and other critical internet-based information systems against cyberattacks, you have to decide which approach to apply when. This is what joining the Post Graduate Certificate in Cybersecurity from MIT xPRO will teach you while developing your capability and giving your resume the MIT xPRO advantage! It's an immersive certificate program that will provide you with a comprehensive introduction to cybersecurity focused on the defensive and offensive aspects of technology. You will also benefit from receiving personalized feedback from program leaders, insights from guest speakers, career coaching, mentorship from leading faculty who are thought leaders in the field, and the opportunity to create a capstone network development project for a job portfolio.

Program Highlights

MIT x Pro PGCCY-IN-AYC-Icon-1

A certificate from MIT xPRO to recognize your skills and success

MIT x Pro PGCCY-IN-AYC-Icon-2

Insights and case studies from renowned MIT faculty

MIT x Pro PGCCY-IN-AYC-Icon-3

Market-ready cybersecurity skills in a high-growth market

MIT x Pro PGCCY-IN-AYC-Icon-4

Capstone presentation project to share with potential employers

MIT x Pro PGCCY-IN-AYC-Icon-5

Access to cutting-edge tools and frameworks from MIT

MIT x Pro PGCCY-IN-AYC-Icon-6

Bi-weekly doubt clearing session with learning facilitators

Program Frameworks

MIT x Pro PGCCY-IN-PF-Icon-1
National Institute of Standards and Technology (NIST) Framework

The NIST CSF framework is threaded throughout the entire program as a commonly used framework. It is a widely used cybersecurity framework that encompasses guidelines for organizations to prepare themselves against cybersecurity attacks.

MIT x Pro PGCCY-IN-PF-Icon-2
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) is discussed in the defensive cybersecurity section. This framework includes domains covering the aspects of cloud technology.

MIT x Pro PGCCY-IN-PF-Icon-3
MITRE ATT&CK®

The MITRE ATT&CK® knowledge base is explored deeper in the offensive and defensive pieces of this program. It contains adversary tactics and techniques that are utilized as the foundational development of specific threat models and methodologies.

Tools Covered

Note: The tools will be taught by teaching faculty, industry practitioners, or linked to relevant knowledge bases for your reference and self-guided learning.

Types of Tools Discussed

types-tools-icon-1

Security Information and Event Management Tools

types-tools-icon-2

User and Entity Behavior Analytics Tools

types-tools-icon-3

Endpoint Detection and Response Tools

types-tools-icon-4

Security Orchestration and Response Tools

types-tools-icon-5

Incident Response Tools

types-tools-icon-6

Penetration Testing Tools

types-tools-icon-7

Encryption Tools

types-tools-icon-8

Network Security Monitoring Tools

types-tools-icon-9

Social Engineering Toolkit

Who Is this Program for?

Mid-level and Senior-level career professionals who have established their careers in information technology and are looking to improve their organization's preparedness and response against cyberattacks and grow their career as leaders in cybersecurity strategies will benefit most from this program.

Additionally, graduates and early career professionals with or without prior experience in the IT field who want to specialize in cybersecurity from a globally recognized school and accelerate their career in a high-growth field with high-demand job opportunities will benefit from this program.

Eligibility: Candidates with 5+ years of work experience as on June 26, 2024 are preferred.

Case Studies

solarwinds-logo

The Solar Winds supply chain attack of 2020, which compromised several thousand Orion users

saudi-aramco-logo

The Saudi Aramco cyberattack of 2012 which wiped out 35000 computers and put the operations of the biggest oil company in the world at risk

cisco-logo

The Cisco debacle of 2018 where a Cisco engineer broke through the security of Cisco, accessed 456 virtual machines and deleted 16000 Webex accounts

mirai-logo

The MIRAI botnet attack of 2016, a severe DDOS attack which rendered much of the internet of the US east coast inaccessible

verizon-media-logo

A study of the cyberculture and best practices in Cybersecurity on Verizon media

ukraine-logo

The Ukraine PowerGrid attack of 2015 which blew power for 200000+ consumers for 1-6 hours in Ukraine

city-of-baltimore-logo

The Baltimore ransomware attack of 2019 where Baltimore city was attacked by the aggressive ransomware RobbinHood costing more than $18mn

Past Participant Profile

Work Experience
MITxPro-PGCCY-work-experience
Top Industries
  • IT Services & Products

  • Banking and Financial Services

  • Healthcare

  • Electronics / Hardware

  • *Others

*Others include FMCG, E-commerce, Consulting & Manufacturing amongst others

Job Function
  • Information Technology

  • Engineering

  • Consulting

  • Project Management

  • *Others

*Others includes Sales, Legal and Finance amongst others

Program Certificate

Program Certificate

Get recognized! Upon successful completion of this program, MIT xPRO grants a certificate of completion to participants and 40 Continuing Education Units (CEUs). This program is graded as a pass or fail; participants must receive 75% to pass and obtain the certificate of completion.

After successful completion of the program, your verified digital certificate will be emailed to you, at no additional cost, with the name you used when registering for the program. All certificate images are for illustrative purposes only and may be subject to change at the discretion of MIT.

Program Faculty

KERI PEARLSON-faculty
KERI PEARLSON

Executive Director of Cybersecurity at MIT Sloan (CAMS): The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity at the MIT Sloan School of Management

Dr. Pearlson is the executive director of Cybersecurity at MIT Sloan: The Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC)3. Pearlson has ...

NICKOLAI ZELDOVICH-faculty
NICKOLAI ZELDOVICH

Professor of Electrical Engineering and Computer Science, and a member of the Computer Science and Artificial Intelligence Laboratory at MIT

Dr. Zeldovich is a professor of electrical engineering and computer science at MIT and a member of the Computer Science and Artificial Intelligence Laboratory. He received his...

DANIEL J. WEITZNER-faculty
DANIEL J. WEITZNER

3Com Founders Principal Research Scientist, Founding Director, MIT Internet Policy Research Initiative, MIT Computer Science and Artificial Intelligence Lab

Daniel Weitzner is the founding director of the MIT Internet Policy Research Initiative and principal research scientist at CSAIL. In addition, he teaches internet public poli...

STUART MADNICK-Faculty
STUART MADNICK

John Norris Maguire Professor of Information Technologies, Emeritus, Sloan School of Management, Professor of Engineering Systems, School of Engineering and Founding Director, research consortium Cybersecurity at MIT Sloan (CAMS)

Dr. Madnick is the John Norris Maguire Professor of Information Technologies, Emeritus at the MIT Sloan School of Management and the founding director of Cybersecurity at MIT ...

LARRY SUSSKIND-faculty
LARRY SUSSKIND

Ford Professor of Urban and Environmental Planning, MIT Vice Chair and Co-founder, Program on Negotiation at Harvard Law School

Prof. Susskind's research interests focus on the theory and practice of negotiation and dispute resolution, the practice of public engagement in local decision-making, cyberse...

UNA-MAY O-REILLY-faculty
UNA-MAY O'REILLY

Principal Research Scientist and Leader of ALFA Group at MIT-CSAIL

Dr. O'Reilly's research group, AnyScale Learning for All, develops new, data-driven analyses of online coding courses, deep learning techniques for program representations, ad...

BARBARA JOHNSON-faculty
BARBARA JOHNSON

Senior Security Consultant, Security Certification Educator, Lecturer at MIT Sloan School of Management

Securing information systems is Barbara's purpose and educating security professionals is her passion.

Barbara Johnson is a Senior Security, Audit and Compliance Management C...

RAJIV SHRIDHAR-faculty
RAJIV SHRIDHAR

Information Security Officer and Director of Research Computing, MIT Sloan School of Management

Rajiv Shridhar is the Information Security Officer and Director of Research Computing at MIT Sloan School of Management. He leads the team that enables the research of MIT Slo...

HOWARD SHROBE-faculty
HOWARD SHROBE

Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambridge, Massachusetts

Howard Shrobe is a Principal Research Scientist at the Massachusetts Institute of Technology (MIT) Computer Science and Artificial Intelligence Laboratory (MIT CSAIL), Cambrid...

Section Summaries

Introduction to Cybersecurity-icon-1

Section 1: Introduction to Cybersecurity

The first three months of this program serve as an introduction to cybersecurity with a focus on fundamental concepts and IAM (identity and access management).

Defensive Cybersecurity - Icon-2

Section 2: Defensive Cybersecurity

The second set of three months focus on defensive cybersecurity. Take a deeper dive into concepts that include cryptography, SOC (security operations center), IR (incident response), secure systems and network administration, and cloud security.

Offensive Cybersecurity - Icon-3

Section 3: Offensive Cybersecurity

The next set of months address the importance of offensive cybersecurity through topics such as penetration testing, social engineering, artificial intelligence, privacy, regulation and data governance, and OT (Operational Technology) and IoT (Internet of Things) risk.

Program Modules

  • Module 1: Introduction to Cybersecurity Risk Management

  • Module 2: Cybersecurity Foundation Concepts

  • Module 3: Federal Government’s Role: Laws, Operations, and Standards

  • Module 4: Threats and Vulnerabilities

  • Module 5: Cybersecurity and Critical Urban Infrastructure

  • Module 6: IAM(Identity Access Management) Concepts

  • Module 7: Layers of IAM and Technologies

  • Module 8: Preparing for a Job in Cybersecurity Risk Management

  • Module 9: Intro to Defensive Cybersecurity

  • Module 10: Cryptography

  • Module 11: Security Operations Centre

  • Module 12: Incident Response

  • Module 13: Secure Systems Administration

  • Module 14: Secure Network Administration

  • Module 15: Cloud Security

  • Module 16: Preparing for a Job in Cybersecurity Operations

  • Module 17: Intro to Offensive Cybersecurity

  • Module 18: Penetration Testing Part 1

  • Module 19: Penetration Testing Part 2

  • Module 20: Social Engineering

  • Module 21: Artificial Intelligence

  • Module 22: Policy and Privacy, Regulation, and Data Governance

  • Module 23: OT and IoT Risk

  • Module 24: Preparing for a Job in Offensive Cybersecurity Operations

Capstone Project

  • Participants will work on a capstone project detailing the Equifax data breach of 2017 and associated events.

  • Participants will analyse the data breach which resulted in the breach of data of 140 million consumers.

  • They will investigate what were the primary reasons of the breach and gaps in cybersecurity in the case, using the knowledge gained during the course.

  • Participants would then create a defensive and offensive strategy to tackle such breaches and present their findings and their key insights in detail.

  • The project will help participants observe, analyse, and implement their learnings in a real-life case and get the best out of the MIT Post Graduate in Cybersecurity course.

Program Mentor & Learning Facilitators

Dinesh Bareja - Program Mentor
Dinesh Bareja

Mentor, Founder & COO - Open Security Alliance and IndiaWatch.in Advisor - Cyber Peace Foundation & Defence Institute of Advanced Technology Ex Cyber Surveillance Advisor - Jharkhand Police

Dinesh is an Information Security Management professional working in the IT/IS domain for more than a decade on consulting, auditing, and advisory projects in India and overse...

Bhowmik Shah - Program Mentor
Bhowmik Shah

Learning Facilitator, Co-Founder and Chief Technology Officer - CyberNX Technologies Private Limited

Bhowmik Shah is a seasoned Systems and Security professional with global experience with enterprises across Australia, USA, and India. He has an extensive background in DevOps...

Dr. Akashdeep Bhardwaj - Program Mentor
Dr. Akashdeep Bhardwaj

Learning Facilitator, Research Professor (Cyber Security & Digital Forensics) - University of Petroleum and Energy Studies Subject Matter Expert - Security+ CompTIA International Advisory Board Member - Certified Ethical Hacking (CEH)

Over 26 years of IT Enterprise and academic experience with multinational organizations. Expertise in Cybersecurity, Digital Forensics, IT Security & Operations Management, an...

Golam Azam - Program Mentor
Golam Azam

Next-Generation Cybersecurity Leader - United Airlines, PwC, CNBC / NBCUniversal, 7Eleven, US Presidential Election Security (NDIT), AIG Founder of Israel Technologies Inc. Sr. Consultant - PaloAlto Networks

Golam Azam commands 15 plus years of core experienced versatile Cybersecurity Leadership, Teacher, Architect, Writer & Mentor with Executive MBA and outstanding Computer Engin...

Registration for this program is done through Emeritus. You can contact us at mit.xpro@emeritus.org

This program is open for enrolments for residents of India, Bangladesh, Bhutan, Myanmar, Nepal, Pakistan, Sri Lanka, Philippines, Indonesia, Thailand, Vietnam and Malaysia only.

Note:

Learning facilitator details and office hour dates and timings are from previous batches. The learning facilitators may change for upcoming batches based on availability and the office hour timings and dates may be changed based on a mutually decided schedule between Emeritus and the Learning facilitator.

*Mentioned timelines are tentative.

Emeritus Career Services*

Career Management Modules on:

  • Building an Impressive Resume & Cover Letter

  • Building an Impressive LinkedIn Profile

  • Navigating Job Search

  • Interview Preparation

  • Job Assistance

Please note:

  • This service is available only for Indian residents enrolled into select Emeritus programs.

  • MIT xPRO or Emeritus do NOT promise or guarantee a job or progression in your current job. Career Services is only offered as a service that empowers you to manage your career proactively. The Career Services mentioned here are offered by Emeritus. MIT xPRO is NOT involved in any way and makes no commitments regarding the Career Services mentioned here.

Financing Options* Starting at INR 8,325/ Month.

Program Fee

Maximum Loan Amount

Tenure (months)

EMI

INR 2,87,000

INR 3,38,660

12

INR 30,903

Program Fee

Maximum Loan Amount

Tenure (months)

EMI

INR 2,87,000

INR 3,38,660

24

INR 16,792

Program Fee

Maximum Loan Amount

Tenure (months)

EMI

INR 2,87,000

INR 3,38,660

36

INR 12,088

Program Fee

Maximum Loan Amount

Tenure (months)

EMI

2,87,000

3,38,660

48

9,736

Program Fee

Maximum Loan Amount

Tenure (months)

EMI

2,87,000

3,38,660

60

8,325

Note:

The above EMI's are indicative and figures in INR are approx.

The EMI's offered by each of the loan providers might vary from the above figures, depending upon tenure and loan amount to be disbursed.

Our Program Advisors will help you with information on how to avail a loan from our loan providers.

*Applicable only for Indian residents.

The Learning Experience

What is it like to learn with the learning collaborator, Emeritus?

More than 300,000 professionals globally, across 200 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded. All the contents of the course would be made available to students at the commencement of the course. However, to ensure the program delivers the desired learning outcomes, the students may appoint Emeritus to manage the delivery of the program in a cohort-based manner during the course period the cost of which is already included in the overall Course fee of the course.

A dedicated program support team is available 7 days a week to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.

Early Registrations Are Encouraged. Seats Fill Up Quickly!

Flexible payment options available.

Starts On